Abstract:
A first computing device monitors a presence of a second computing device, and determines when the second computing device has moved out of an area proximate to the first computing device. In response to determining that the second computer moved out of the area, the first computing device is automatically configured to limit user interaction with one or more applications currently operating on the first computing device to a predetermined set of commands while preventing user interaction with other applications provided by the first computing device.
Abstract:
A computer-implemented computer shut-down method includes identifying that a computing device has been moved from an open configuration in which input and output mechanisms on the computing device are accessible to a user, to a closed configuration in which at least some of the input and output mechanisms are inaccessible to a user; starting a shut-down timer in response to identifying that the computing device has been moved from the open configuration to the closed configuration; waiting a predefined time period, as established by the shut-down timer, and determining from the shut-down timer that the computing device can be transitioned from an active state into a sleep state in which power consuming components of the computing device are powered down; and transitioning the computing device from the active state to the sleep state upon determining that the computing device can be transitioned.
Abstract:
A method for transferring content includes transferring content from a first device to a second device in response to a request from the first device to transfer the content, analyzing the transferred content at the second device, to determine a type of the transferred content and providing the transferred content for display at the second device according to the determined type of the transferred content.
Abstract:
A computer-implemented computer shut-down method includes identifying that a computing device has been moved from an open configuration in which input and output mechanisms on the computing device are accessible to a user, to a closed configuration in which at least some of the input and output mechanisms are inaccessible to a user; starting a shut-down timer in response to identifying that the computing device has been moved from the open configuration to the closed configuration; waiting a predefined time period, as established by the shut-down timer, and determining from the shut-down timer that the computing device can be transitioned from an active state into a sleep state in which power consuming components of the computing device are powered down; and transitioning the computing device from the active state to the sleep state upon determining that the computing device can be transitioned.
Abstract:
A computer-implemented computer shut-down method includes identifying that a computing device has been moved from an open configuration in which input and output mechanisms on the computing device are accessible to a user, to a closed configuration in which at least some of the input and output mechanisms are inaccessible to a user; starting a shut-down timer in response to identifying that the computing device has been moved from the open configuration to the closed configuration; waiting a predefined time period, as established by the shut-down timer, and determining from the shut-down timer that the computing device can be transitioned from an active state into a sleep state in which power consuming components of the computing device are powered down; and transitioning the computing device from the active state to the sleep state upon determining that the computing device can be transitioned.
Abstract:
A method includes transforming a mode of a computer from an operating system mode to a kiosk mode, wherein the kiosk mode provides a user interface for one web application, and wherein the kiosk mode prevents access to any other application or the operating system of the computer. The computer automatically updates the web application via a network while the computer is operating in kiosk mode, and automatically updates an operating system of the computer via the network while the computer is operating in kiosk mode. The computer automatically re-launches the web application in response to detecting an interrupted status of the web application while the computer is operating in kiosk mode.
Abstract:
The subject disclosure relates to associating contacts with corresponding system actions. It includes identifying a contact profile for configuring with system actions, based on one or more of an address book, user input, online accounts, or an interaction with a contact corresponding to the contact profile, retrieving contact information for the identified contact profile and determining at least one available system action based on the retrieved contact information for the identified contact profile. The disclosure also includes generating, based on the retrieved contact information, a system icon representing the contact profile for displaying the contact profile in a graphic user interface component of an operating system and associating the at least one available system action with the contact profile by configuring the at least one available system action to automatically launch when selected at the system icon representing the contact profile.
Abstract:
A method includes transforming a mode of a computer from an operating system mode to a kiosk mode, wherein the kiosk mode provides a user interface for one web application, and wherein the kiosk mode prevents access to any other application or the operating system of the computer. The computer automatically updates the web application via a network while the computer is operating in kiosk mode, and automatically updates an operating system of the computer via the network while the computer is operating in kiosk mode. The computer automatically re-launches the web application in response to detecting an interrupted status of the web application while the computer is operating in kiosk mode.